Sciweavers

6555 search results - page 1201 / 1311
» Secure attribute-based systems
Sort
View
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
15 years 8 months ago
Perfect NIZK with Adaptive Soundness
Abstract. This paper presents a very simple and efficient adaptivelysound perfect NIZK argument system for any NP-language. In contrast to recently proposed schemes by Groth, Ostro...
Masayuki Abe, Serge Fehr
VLDB
2007
ACM
119views Database» more  VLDB 2007»
15 years 8 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
139
Voted
CBMS
2006
IEEE
15 years 8 months ago
Dorian: Grid Service Infrastructure for Identity Management and Federation
Identity management and federation is becoming an ever present problem in large multi-institutional environments. By their nature, Grids span multiple institutional administration...
Stephen Langella, Scott Oster, Shannon Hastings, F...
CCGRID
2006
IEEE
15 years 8 months ago
An Extensible Resource Discovery Mechanism for Grid Computing Environments
Grid computing is emerging as a new infrastructure to provide collaborative and secure resource sharing over multiple geographically distributed organizations. In this scenario, r...
Tania Gomes Ramos, Alba Cristina Magalhaes Alves d...
DSD
2006
IEEE
113views Hardware» more  DSD 2006»
15 years 8 months ago
Lifetime Analysis in Heterogeneous Sensor Networks
Wireless sensor networks (WSN) are composed of battery-driven communication entities performing multiple, usually different tasks. In order to complete a given task, all sensor no...
Falko Dressler, Isabel Dietrich
« Prev « First page 1201 / 1311 Last » Next »